Traffic matrix estimation: Existing techniques and new directions A Medina, N Taft, K Salamatian, S Bhattacharyya, C Diot ACM SIGCOMM Computer Communication Review 32 (4), 161-174, 2002 | 807 | 2002 |
Structural analysis of network traffic flows A Lakhina, K Papagiannaki, M Crovella, C Diot, ED Kolaczyk, N Taft ACM SIGMETRICS Performance evaluation review 32 (1), 61-72, 2004 | 715 | 2004 |
Privacy-preserving ridge regression on hundreds of millions of records V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft 2013 IEEE Symposium on Security and Privacy, 334-348, 2013 | 588 | 2013 |
Antidote: understanding and defending against poisoning of anomaly detectors BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ... Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 1-14, 2009 | 471 | 2009 |
Combining filtering and statistical methods for anomaly detection A Soule, K Salamatian, N Taft Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 31-31, 2005 | 438 | 2005 |
Privacy-preserving matrix factorization V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 355 | 2013 |
Learning in a large function space: Privacy-preserving mechanisms for svm learning BIP Rubinstein, PL Bartlett, L Huang, N Taft arXiv preprint arXiv:0911.5708, 2009 | 323 | 2009 |
Traffic matrices: balancing measurements, inference and modeling A Soule, A Lakhina, N Taft, K Papagiannaki, K Salamatian, A Nucci, ... Proceedings of the 2005 ACM SIGMETRICS international conference on …, 2005 | 289 | 2005 |
In-network PCA and anomaly detection L Huang, XL Nguyen, M Garofalakis, M Jordan, A Joseph, N Taft Advances in neural information processing systems 19, 2006 | 288 | 2006 |
Long-term forecasting of internet backbone traffic: Observations and initial models K Papagiannaki, N Taft, ZL Zhang, C Diot IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 272 | 2003 |
Blurme: inferring and obfuscating user gender based on ratings U Weinsberg, S Bhagat, S Ioannidis, N Taft Proceedings of the sixth ACM conference on Recommender systems, 195-202, 2012 | 217 | 2012 |
The problem of synthetically generating IP traffic matrices: initial recommendations A Nucci, A Sridharan, N Taft ACM SIGCOMM Computer Communication Review 35 (3), 19-32, 2005 | 203 | 2005 |
An approach to alleviate link overload as observed on an IP backbone S Iyer, S Bhattacharyya, N Taft, C Diot IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 198 | 2003 |
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. S Nedevschi, J Chandrashekar, J Liu, B Nordman, S Ratnasamy, N Taft NSDI 9, 381-394, 2009 | 191 | 2009 |
GraphSC: Parallel secure computation made easy K Nayak, XS Wang, S Ioannidis, U Weinsberg, N Taft, E Shi 2015 IEEE Symposium on Security and Privacy, 377-394, 2015 | 185 | 2015 |
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system A Levi, O Mokryn, C Diot, N Taft Proceedings of the sixth ACM conference on Recommender systems, 115-122, 2012 | 185 | 2012 |
Communication-efficient online detection of network-wide anomalies L Huang, XL Nguyen, M Garofalakis, JM Hellerstein, MI Jordan, ... IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 183 | 2007 |
IGP link weight assignment for transient link failures A Nucci, B Schroeder, S Bhattacharyya, N Taft, C Diot Teletraffic Science and Engineering 5, 321-330, 2003 | 163 | 2003 |
Long-term forecasting of Internet backbone traffic K Papagiannaki, N Taft, ZL Zhang, C Diot IEEE Transactions on Neural Networks 16 (5), 1110-1124, 2005 | 159 | 2005 |
Macroscope: end-point approach to networked application dependency discovery L Popa, BG Chun, I Stoica, J Chandrashekar, N Taft Proceedings of the 5th international conference on Emerging networking …, 2009 | 155 | 2009 |